IT Management  >   Systems Operations  >   Security  >  

Web Security

RSS Feed    Add to Google    Add to My Yahoo!
Web SecurityWhite Papers (View All Report Types)
 
How To Secure Online Activities
sponsored by Global Knowledge
WHITE PAPER: The Internet is not automatically a secure or safe place to be. However, if one system's security is more daunting to overcome than another's, then attackers might focus on the system that is easier to compromise.
Posted: 05 Sep 2013 | Published: 30 Jul 2013

Global Knowledge

Managing Web Security in an Increasing Challenging Threat Landscape
sponsored by SearchSecurity.com
WHITE PAPER: This resource offers guidance to help your organization manage web security in an increasingly dangerous threat landscape. Learn how cybercriminals are targeting web-based vulnerabilities and see what you can do to stay safe by reading on now.
Posted: 31 May 2013 | Published: 31 May 2013

SearchSecurity.com

Internet-Scale Identity Systems:An Overview and Comparison
sponsored by Ping Identity Corporation
WHITE PAPER: This white paper provides an overview of the benefits of implementing an Internet-based identity system and explores the similarities, differences and synergies among the top technologies and initiatives available.
Posted: 27 Mar 2014 | Published: 04 Mar 2014

Ping Identity Corporation

Imperva's Web Application Attack Report
sponsored by Imperva
WHITE PAPER: Imperva’s Application Defense Center (ADC), as part of its ongoing Hacker Intelligence Initiative, studied web application attacks across 40 applications over a six month period. View this report to explore key findings and gain recommendations to help you better prioritize vulnerability remediation and web application projects.
Posted: 04 Apr 2012 | Published: 02 Jan 2012

Imperva

How to Avoid Targeted Web and Email Attacks
sponsored by M86 Security
WHITE PAPER: This white paper uncovers the dangers of targeted attacks, how and why cybercriminals have been so successful at exploiting traditional security technologies, and what your company can do to avoid becoming the next victim of a targeted attack.
Posted: 19 Jul 2011 | Published: 19 Jul 2011

M86 Security

Unified Threat Management: The Best Defense against Blended Threats
sponsored by SonicWALL
WHITE PAPER: The SonicWALL® Unified Threat Management solution (UTM) provides the most intelligent, real-time network protection against sophisticated application-layer and content-based attacks.
Posted: 28 Apr 2008 | Published: 01 Jan 2005

SonicWALL

Security Fears & Cloud Computing: Buidling Trust in New Data Delivery Models
sponsored by AVG Technologies USA, Inc.
WHITE PAPER: Cloud computing has been widely heralded as the "next big thing" in technology circles. At the same time it has arguably been overcomplicated in terms of the way it has been described. Check out this white paper to learn more about the security issues of cloud computing.
Posted: 05 Nov 2010 | Published: 05 Nov 2010

AVG Technologies USA, Inc.

Escalating Targeted Web and Email Attacks
sponsored by M86 Security UK
WHITE PAPER: Today's cybercriminals are more dangerous and sophisticated than ever before, launching more targeted attacks for bigger payoffs. And with new emerging technologies, also come new ways of exploitation. In this resource, explore the growing issue of targeted web and email threats and discover a unique approach to mitigating them.
Posted: 23 Feb 2012 | Published: 23 Feb 2012

M86 Security UK

The Need to Secure All Business Communications: A competitive Overview of Major Players in the Market
sponsored by Webroot
WHITE PAPER: This Bloor Research paper offers an overview of the major players in the market for hosted email and web security services. View now to evaluate these services and explore key recommendations for selecting the right vendor for your organisations' needs.
Posted: 25 Jul 2011 | Published: 01 Dec 2010

Webroot

A Buyer's Guide to Data Loss Protection Solutions
sponsored by Websense, Inc.
WHITE PAPER: Selecting an DLP solution can be a challange and it is important to find one that provides the right amount of coverage for your business. View this guide for list of recommended features and capabilities to consider when searching for the right DLP solution.
Posted: 14 Jul 2011 | Published: 14 Jul 2011

Websense, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement